Slashdot videos: Now with more Slashdot!

View

Discuss

Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).

First time accepted submitter danbuter writes "In probably the most poorly thought-out reaction to allowing people displaced by Hurricane Sandy in New Jersey [to take part in the 2012 presidential election], residents will be allowed to vote by email. Of course, this will be completely secure and work perfectly!" Writes user Beryllium Sphere: "There's no mention of any protocol that might possibly make this acceptable. Perhaps the worst thing that could happen would be if it appears to work OK and gains acceptance." I know someone they should consult first.

Allowing non-secret voting creates the conditions under which coercion can take place.

How do we know Tony Soprano hasn't threatened everyone in the neighborhood to vote for his candidate? Let's say one of Tony's associates is at the polling place, "observing" the election as his right. If he is watching you vote, he can be sure you voted his way. If you have the "choice" of a secret ballot or a non-secret ballot, he could tell you up front "don't be choosing the secret ballot, I need to see your vote. Or else."

If the voter is not given the choice of non-secrecy, that vote can't be subverted. In a secret ballot, the voter can always make their own free-will choice. And only through enforcing ballot secrecy can the election judges be certain that the vote was impartial.

I would trust them IF the politicians out there had any balls at all and DEMAND that the source code be 100% open. That way they can hire a 3rd party to compile the source code and test, then seal the units. But Diebold refuses to release the source code because they are hiding something.

If the company that makes the machine will not release the source code, you must assume they are crooked and hiding something.